• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security

5 Things Your College Needs to Know About Network Attacks & Security Trends

EDUCAUSE attendee and Vice President of U.S. Education sales at Fortinet, Bryan Wood, talks about cybersecurity trends and tips to keeping a college network safe.

November 11, 2015 Jessica Kennedy Leave a Comment

1. What are currently the biggest security threats colleges are seeing today?

Higher education is an inherently complex landscape, striking a balance between an open learning environment and protecting resources that make that learning environment possible. Security needs to be robust without impeding learning. Students are rapidly accelerating the number of devices being introduced to the network, which is greatly increasing the attack surface. The influx of disparate devices combined with a widened attack surface present some of the greatest security challenges in higher education today. Add that to the fact that higher education institutions are rich targets for outside attackers trying to access copious amounts of personal data, and it becomes evident that IT has a monumental task to ensure a secure environment.

Vice President of U.S. Education sales at Fortinet, Bryan Wood.

2. What are some technologies colleges can use to up security against these threats?

DDoS attacks are growing significantly in education. Motives range from students trying to cripple the network to interrupt testing to outside attacks attempting to infiltrate valuable data and personal information. Needless to say, a solution that will help alleviate DDoS attacks is key for any higher education environment as these attacks will continue to surface. Additionally, robust visibility and protection at the firewall level will help mitigate threats to an institution. Segmenting different parts of the network (from a firewall perspective) will also help ensure that should an attack get through, it will be contained within a limited scope.

3. What trends do you see occurring in cybersecurity in higher education?

Two trends stick out in my mind in higher education: first is the desire to move applications and data into a cloud environment. Most schools I have talked to are looking for a hybrid approach between on prem and cloud-based deployments. What remains consistent is that they want to ensure the same security exists at both levels. A second trend is focusing on how to secure research traffic. The typical challenge here is around scalability as research networks are scaling out into 100GB environments. Nevertheless, there is a great deal of valuable intellectual property that a school must protect.

4. What are some tips you would give to colleges to better equip their campus against threats?

Higher education tends to be a communal experience between institutions. Unlike many other vertical markets, there is a willingness to share information, best practices, buying decisions, etc. I have attended conferences, advisory boards and user groups where helpful information has been shared back and forth on topics such as security best practices, how to run a proof of concept and how to integrate different elements into a security infrastructure. Colleges should capitalize on this environment, as it can provide a wealth of information.

5. Where do you see the future of security heading for in 2016?

Many institutions are seeking the balance between security and scale. Device proliferation and increasing bandwidth are driving the need to plan more creatively for the next three to five years. Security is paramount and must be a top priority for any higher education environment. However, providing scalability and protecting their investment is also key to a successful deployment of any infrastructure.

Jessica Kennedy
Jessica Kennedy

Jessica Kennedy is an editor at TechDecisions Media, targeting the higher education market. Jessica joined the TechDecisions team in 2014 and covers technologies that improve teaching and learning.

Tagged With: Data Backup & Recovery, Higher Ed, Malware Protection

Related Content:

  • ChatGPT, OpenAI, Artificial Intelligence, AI development Pump the Brakes on AI Development, Tech and…
  • Barracuda networks ransomware, cyberinurance Ransomware Actors May Be Targeting Organizations With Cyber…
  • Bitwarden Secrets manager Bitwarden Releases Beta of Secrets Manager for DevOps…
  • Zoom Okta E2EE Zoom Users Can Now Use Okta to Authenticate…

Free downloadable guide you may like:

  • Four IT Trends That Will Define 2023Expert Series: Four IT Trends That Will Define 2023

    Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations emerging from each.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Four IT Trends That Will Define 2023
Expert Series: Four IT Trends That Will Define 2023

Learn about four key technologies we identified as critical to your IT organization’s success in 2023, as well as how to invest in new innovations ...

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.